1 |
24 |
jeremybenn |
/* VxWorks support for ELF
|
2 |
225 |
jeremybenn |
Copyright 2005, 2006, 2007, 2009 Free Software Foundation, Inc.
|
3 |
24 |
jeremybenn |
|
4 |
|
|
This file is part of BFD, the Binary File Descriptor library.
|
5 |
|
|
|
6 |
|
|
This program is free software; you can redistribute it and/or modify
|
7 |
|
|
it under the terms of the GNU General Public License as published by
|
8 |
|
|
the Free Software Foundation; either version 3 of the License, or
|
9 |
|
|
(at your option) any later version.
|
10 |
|
|
|
11 |
|
|
This program is distributed in the hope that it will be useful,
|
12 |
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
13 |
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
14 |
|
|
GNU General Public License for more details.
|
15 |
|
|
|
16 |
|
|
You should have received a copy of the GNU General Public License
|
17 |
|
|
along with this program; if not, write to the Free Software
|
18 |
|
|
Foundation, Inc., 59 Temple Place - Suite 330, Boston,
|
19 |
|
|
MA 02111-1307, USA. */
|
20 |
|
|
|
21 |
|
|
/* This file provides routines used by all VxWorks targets. */
|
22 |
|
|
|
23 |
|
|
#include "sysdep.h"
|
24 |
|
|
#include "bfd.h"
|
25 |
|
|
#include "libbfd.h"
|
26 |
|
|
#include "elf-bfd.h"
|
27 |
|
|
#include "elf-vxworks.h"
|
28 |
|
|
#include "elf/vxworks.h"
|
29 |
|
|
|
30 |
|
|
/* Return true if symbol NAME, as defined by ABFD, is one of the special
|
31 |
|
|
__GOTT_BASE__ or __GOTT_INDEX__ symbols. */
|
32 |
|
|
|
33 |
|
|
static bfd_boolean
|
34 |
|
|
elf_vxworks_gott_symbol_p (bfd *abfd, const char *name)
|
35 |
|
|
{
|
36 |
|
|
char leading;
|
37 |
|
|
|
38 |
|
|
leading = bfd_get_symbol_leading_char (abfd);
|
39 |
|
|
if (leading)
|
40 |
|
|
{
|
41 |
|
|
if (*name != leading)
|
42 |
|
|
return FALSE;
|
43 |
|
|
name++;
|
44 |
|
|
}
|
45 |
|
|
return (strcmp (name, "__GOTT_BASE__") == 0
|
46 |
|
|
|| strcmp (name, "__GOTT_INDEX__") == 0);
|
47 |
|
|
}
|
48 |
|
|
|
49 |
|
|
/* Tweak magic VxWorks symbols as they are loaded. */
|
50 |
|
|
bfd_boolean
|
51 |
|
|
elf_vxworks_add_symbol_hook (bfd *abfd,
|
52 |
|
|
struct bfd_link_info *info,
|
53 |
|
|
Elf_Internal_Sym *sym,
|
54 |
|
|
const char **namep,
|
55 |
|
|
flagword *flagsp,
|
56 |
|
|
asection **secp ATTRIBUTE_UNUSED,
|
57 |
|
|
bfd_vma *valp ATTRIBUTE_UNUSED)
|
58 |
|
|
{
|
59 |
|
|
/* Ideally these "magic" symbols would be exported by libc.so.1
|
60 |
|
|
which would be found via a DT_NEEDED tag, and then handled
|
61 |
|
|
specially by the linker at runtime. Except shared libraries
|
62 |
|
|
don't even link to libc.so.1 by default...
|
63 |
|
|
If the symbol is imported from, or will be put in a shared library,
|
64 |
|
|
give the symbol weak binding to get the desired samantics.
|
65 |
|
|
This transformation will be undone in
|
66 |
|
|
elf_i386_vxworks_link_output_symbol_hook. */
|
67 |
|
|
if ((info->shared || abfd->flags & DYNAMIC)
|
68 |
|
|
&& elf_vxworks_gott_symbol_p (abfd, *namep))
|
69 |
|
|
{
|
70 |
|
|
sym->st_info = ELF_ST_INFO (STB_WEAK, ELF_ST_TYPE (sym->st_info));
|
71 |
|
|
*flagsp |= BSF_WEAK;
|
72 |
|
|
}
|
73 |
|
|
|
74 |
|
|
return TRUE;
|
75 |
|
|
}
|
76 |
|
|
|
77 |
|
|
/* Perform VxWorks-specific handling of the create_dynamic_sections hook.
|
78 |
|
|
When creating an executable, set *SRELPLT2_OUT to the .rel(a).plt.unloaded
|
79 |
|
|
section. */
|
80 |
|
|
|
81 |
|
|
bfd_boolean
|
82 |
|
|
elf_vxworks_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info,
|
83 |
|
|
asection **srelplt2_out)
|
84 |
|
|
{
|
85 |
|
|
struct elf_link_hash_table *htab;
|
86 |
|
|
const struct elf_backend_data *bed;
|
87 |
|
|
asection *s;
|
88 |
|
|
|
89 |
|
|
htab = elf_hash_table (info);
|
90 |
|
|
bed = get_elf_backend_data (dynobj);
|
91 |
|
|
|
92 |
|
|
if (!info->shared)
|
93 |
|
|
{
|
94 |
|
|
s = bfd_make_section_with_flags (dynobj,
|
95 |
|
|
bed->default_use_rela_p
|
96 |
|
|
? ".rela.plt.unloaded"
|
97 |
|
|
: ".rel.plt.unloaded",
|
98 |
|
|
SEC_HAS_CONTENTS | SEC_IN_MEMORY
|
99 |
|
|
| SEC_READONLY | SEC_LINKER_CREATED);
|
100 |
|
|
if (s == NULL
|
101 |
|
|
|| !bfd_set_section_alignment (dynobj, s, bed->s->log_file_align))
|
102 |
|
|
return FALSE;
|
103 |
|
|
|
104 |
|
|
*srelplt2_out = s;
|
105 |
|
|
}
|
106 |
|
|
|
107 |
|
|
/* Mark the GOT and PLT symbols as having relocations; they might
|
108 |
|
|
not, but we won't know for sure until we build the GOT in
|
109 |
|
|
finish_dynamic_symbol. Also make sure that the GOT symbol
|
110 |
|
|
is entered into the dynamic symbol table; the loader uses it
|
111 |
|
|
to initialize __GOTT_BASE__[__GOTT_INDEX__]. */
|
112 |
|
|
if (htab->hgot)
|
113 |
|
|
{
|
114 |
|
|
htab->hgot->indx = -2;
|
115 |
|
|
htab->hgot->other &= ~ELF_ST_VISIBILITY (-1);
|
116 |
|
|
htab->hgot->forced_local = 0;
|
117 |
|
|
if (!bfd_elf_link_record_dynamic_symbol (info, htab->hgot))
|
118 |
|
|
return FALSE;
|
119 |
|
|
}
|
120 |
|
|
if (htab->hplt)
|
121 |
|
|
{
|
122 |
|
|
htab->hplt->indx = -2;
|
123 |
|
|
htab->hplt->type = STT_FUNC;
|
124 |
|
|
}
|
125 |
|
|
|
126 |
|
|
return TRUE;
|
127 |
|
|
}
|
128 |
|
|
|
129 |
|
|
/* Tweak magic VxWorks symbols as they are written to the output file. */
|
130 |
225 |
jeremybenn |
int
|
131 |
24 |
jeremybenn |
elf_vxworks_link_output_symbol_hook (struct bfd_link_info *info
|
132 |
|
|
ATTRIBUTE_UNUSED,
|
133 |
|
|
const char *name,
|
134 |
|
|
Elf_Internal_Sym *sym,
|
135 |
|
|
asection *input_sec ATTRIBUTE_UNUSED,
|
136 |
|
|
struct elf_link_hash_entry *h)
|
137 |
|
|
{
|
138 |
|
|
/* Reverse the effects of the hack in elf_vxworks_add_symbol_hook. */
|
139 |
|
|
if (h
|
140 |
|
|
&& h->root.type == bfd_link_hash_undefweak
|
141 |
|
|
&& elf_vxworks_gott_symbol_p (h->root.u.undef.abfd, name))
|
142 |
|
|
sym->st_info = ELF_ST_INFO (STB_GLOBAL, ELF_ST_TYPE (sym->st_info));
|
143 |
|
|
|
144 |
225 |
jeremybenn |
return 1;
|
145 |
24 |
jeremybenn |
}
|
146 |
|
|
|
147 |
|
|
/* Copy relocations into the output file. Fixes up relocations against PLT
|
148 |
|
|
entries, then calls the generic routine. */
|
149 |
|
|
|
150 |
|
|
bfd_boolean
|
151 |
|
|
elf_vxworks_emit_relocs (bfd *output_bfd,
|
152 |
|
|
asection *input_section,
|
153 |
|
|
Elf_Internal_Shdr *input_rel_hdr,
|
154 |
|
|
Elf_Internal_Rela *internal_relocs,
|
155 |
|
|
struct elf_link_hash_entry **rel_hash)
|
156 |
|
|
{
|
157 |
|
|
const struct elf_backend_data *bed;
|
158 |
|
|
int j;
|
159 |
|
|
|
160 |
|
|
bed = get_elf_backend_data (output_bfd);
|
161 |
|
|
|
162 |
|
|
if (output_bfd->flags & (DYNAMIC|EXEC_P))
|
163 |
|
|
{
|
164 |
|
|
Elf_Internal_Rela *irela;
|
165 |
|
|
Elf_Internal_Rela *irelaend;
|
166 |
|
|
struct elf_link_hash_entry **hash_ptr;
|
167 |
|
|
|
168 |
|
|
for (irela = internal_relocs,
|
169 |
|
|
irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
|
170 |
|
|
* bed->s->int_rels_per_ext_rel),
|
171 |
|
|
hash_ptr = rel_hash;
|
172 |
|
|
irela < irelaend;
|
173 |
|
|
irela += bed->s->int_rels_per_ext_rel,
|
174 |
|
|
hash_ptr++)
|
175 |
|
|
{
|
176 |
|
|
if (*hash_ptr
|
177 |
|
|
&& (*hash_ptr)->def_dynamic
|
178 |
|
|
&& !(*hash_ptr)->def_regular
|
179 |
|
|
&& ((*hash_ptr)->root.type == bfd_link_hash_defined
|
180 |
|
|
|| (*hash_ptr)->root.type == bfd_link_hash_defweak)
|
181 |
|
|
&& (*hash_ptr)->root.u.def.section->output_section != NULL)
|
182 |
|
|
{
|
183 |
|
|
/* This is a relocation from an executable or shared
|
184 |
|
|
library against a symbol in a different shared
|
185 |
|
|
library. We are creating a definition in the output
|
186 |
|
|
file but it does not come from any of our normal (.o)
|
187 |
|
|
files. ie. a PLT stub. Normally this would be a
|
188 |
|
|
relocation against against SHN_UNDEF with the VMA of
|
189 |
|
|
the PLT stub. This upsets the VxWorks loader.
|
190 |
|
|
Convert it to a section-relative relocation. This
|
191 |
|
|
gets some other symbols (for instance .dynbss), but
|
192 |
|
|
is conservatively correct. */
|
193 |
|
|
for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
|
194 |
|
|
{
|
195 |
|
|
asection *sec = (*hash_ptr)->root.u.def.section;
|
196 |
|
|
int this_idx = sec->output_section->target_index;
|
197 |
|
|
|
198 |
|
|
irela[j].r_info
|
199 |
|
|
= ELF32_R_INFO (this_idx, ELF32_R_TYPE (irela[j].r_info));
|
200 |
|
|
irela[j].r_addend += (*hash_ptr)->root.u.def.value;
|
201 |
|
|
irela[j].r_addend += sec->output_offset;
|
202 |
|
|
}
|
203 |
|
|
/* Stop the generic routine adjusting this entry. */
|
204 |
|
|
*hash_ptr = NULL;
|
205 |
|
|
}
|
206 |
|
|
}
|
207 |
|
|
}
|
208 |
|
|
return _bfd_elf_link_output_relocs (output_bfd, input_section,
|
209 |
|
|
input_rel_hdr, internal_relocs,
|
210 |
|
|
rel_hash);
|
211 |
|
|
}
|
212 |
|
|
|
213 |
|
|
|
214 |
|
|
/* Set the sh_link and sh_info fields on the static plt relocation secton. */
|
215 |
|
|
|
216 |
|
|
void
|
217 |
|
|
elf_vxworks_final_write_processing (bfd *abfd,
|
218 |
|
|
bfd_boolean linker ATTRIBUTE_UNUSED)
|
219 |
|
|
{
|
220 |
|
|
asection * sec;
|
221 |
|
|
struct bfd_elf_section_data *d;
|
222 |
|
|
|
223 |
|
|
sec = bfd_get_section_by_name (abfd, ".rel.plt.unloaded");
|
224 |
|
|
if (!sec)
|
225 |
|
|
sec = bfd_get_section_by_name (abfd, ".rela.plt.unloaded");
|
226 |
|
|
if (!sec)
|
227 |
|
|
return;
|
228 |
|
|
d = elf_section_data (sec);
|
229 |
|
|
d->this_hdr.sh_link = elf_tdata (abfd)->symtab_section;
|
230 |
|
|
sec = bfd_get_section_by_name (abfd, ".plt");
|
231 |
|
|
if (sec)
|
232 |
|
|
d->this_hdr.sh_info = elf_section_data (sec)->this_idx;
|
233 |
|
|
}
|
234 |
|
|
|
235 |
|
|
/* Add the dynamic entries required by VxWorks. These point to the
|
236 |
|
|
tls sections. */
|
237 |
|
|
|
238 |
|
|
bfd_boolean
|
239 |
|
|
elf_vxworks_add_dynamic_entries (bfd *output_bfd, struct bfd_link_info *info)
|
240 |
|
|
{
|
241 |
|
|
if (bfd_get_section_by_name (output_bfd, ".tls_data"))
|
242 |
|
|
{
|
243 |
|
|
if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_START, 0)
|
244 |
|
|
|| !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_SIZE, 0)
|
245 |
|
|
|| !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_ALIGN, 0))
|
246 |
|
|
return FALSE;
|
247 |
|
|
}
|
248 |
|
|
if (bfd_get_section_by_name (output_bfd, ".tls_vars"))
|
249 |
|
|
{
|
250 |
|
|
if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_START, 0)
|
251 |
|
|
|| !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_SIZE, 0))
|
252 |
|
|
return FALSE;
|
253 |
|
|
}
|
254 |
|
|
return TRUE;
|
255 |
|
|
}
|
256 |
|
|
|
257 |
|
|
/* If *DYN is one of the VxWorks-specific dynamic entries, then fill
|
258 |
|
|
in the value now and return TRUE. Otherwise return FALSE. */
|
259 |
|
|
|
260 |
|
|
bfd_boolean
|
261 |
|
|
elf_vxworks_finish_dynamic_entry (bfd *output_bfd, Elf_Internal_Dyn *dyn)
|
262 |
|
|
{
|
263 |
|
|
asection *sec;
|
264 |
|
|
|
265 |
|
|
switch (dyn->d_tag)
|
266 |
|
|
{
|
267 |
|
|
default:
|
268 |
|
|
return FALSE;
|
269 |
|
|
|
270 |
|
|
case DT_VX_WRS_TLS_DATA_START:
|
271 |
|
|
sec = bfd_get_section_by_name (output_bfd, ".tls_data");
|
272 |
|
|
dyn->d_un.d_ptr = sec->vma;
|
273 |
|
|
break;
|
274 |
|
|
|
275 |
|
|
case DT_VX_WRS_TLS_DATA_SIZE:
|
276 |
|
|
sec = bfd_get_section_by_name (output_bfd, ".tls_data");
|
277 |
|
|
dyn->d_un.d_val = sec->size;
|
278 |
|
|
break;
|
279 |
|
|
|
280 |
|
|
case DT_VX_WRS_TLS_DATA_ALIGN:
|
281 |
|
|
sec = bfd_get_section_by_name (output_bfd, ".tls_data");
|
282 |
|
|
dyn->d_un.d_val
|
283 |
|
|
= (bfd_size_type)1 << bfd_get_section_alignment (abfd, sec);
|
284 |
|
|
break;
|
285 |
|
|
|
286 |
|
|
case DT_VX_WRS_TLS_VARS_START:
|
287 |
|
|
sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
|
288 |
|
|
dyn->d_un.d_ptr = sec->vma;
|
289 |
|
|
break;
|
290 |
|
|
|
291 |
|
|
case DT_VX_WRS_TLS_VARS_SIZE:
|
292 |
|
|
sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
|
293 |
|
|
dyn->d_un.d_val = sec->size;
|
294 |
|
|
break;
|
295 |
|
|
}
|
296 |
|
|
return TRUE;
|
297 |
|
|
}
|
298 |
|
|
|
299 |
|
|
|